Evaluating Attacker Risk Behavior in an Internet of Things Ecosystem
نویسندگان
چکیده
In cybersecurity, attackers range from brash, unsophisticated script kiddies and cybercriminals to stealthy, patient advanced persistent threats. When modeling these attackers, we can observe that they demonstrate different risk-seeking risk-averse behaviors. This work explores how an attacker’s risk seeking or averse behavior affects their operations against detection-optimizing defenders in Internet of Things ecosystem. Using evaluation framework which uses real, parametrizable malware, develop a game is played by defender with suite malware parameterized be more aggressive stealthy. These results are evaluated under exponential utility according willingness accept risk. We find who must choose single strategy up front, gain actual than particularly cases where the better equipped two anticipate. Additionally, empirically confirm high-risk, high-reward scenarios beneficial like cybercriminals, while low-risk, low-reward
منابع مشابه
Role and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملimprovement of Location-based Algorithm in the Internet of Things
Location Based Services (LBS) has become an important field of research with the rapid development of Internet-based Information Technology (IOT) technology and everywhere we use smartphones and social networks in our everyday lives. Although users can enjoy the flexibility, facility, facility and location-based services (LBS) with the Internet of Things, they may lose their privacy. An untrust...
متن کاملTowards evaluating emergent behavior of the Internet of Things using large scale simulation techniques
With the increase in Internet of Things devices and more decentralized architectures we see a new type of application gain importance, a type where local interactions between individual entities lead to a global emergent behavior, Emergent-based IoT (EBI) Systems. In this position paper we explore techniques to evaluate this emergent behavior in IoT applications. Because of the required scale a...
متن کاملEnergy Efficient Multi Path Routing Protocol in Internet of Things
Internet of things (IoT) is a network with a wide range of smart and physical objects and gadgets that can exchange information with each other. IOT introduces a variety of services that human life is dependent on its secure and accessible activities. These networks face numerous problems in terms of energy consumption and reliable communication to send the correct data. Moreover, the character...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-90370-1_19